CA2755286C - Systems and methods for document management transformation and security - Google Patents

Systems and methods for document management transformation and security Download PDF

Info

Publication number
CA2755286C
CA2755286C CA2755286A CA2755286A CA2755286C CA 2755286 C CA2755286 C CA 2755286C CA 2755286 A CA2755286 A CA 2755286A CA 2755286 A CA2755286 A CA 2755286A CA 2755286 C CA2755286 C CA 2755286C
Authority
CA
Canada
Prior art keywords
document
recipient
electronic
documents
view
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CA2755286A
Other languages
French (fr)
Other versions
CA2755286A1 (en
Inventor
Donald G. Peterson
Duane E. Wald
Andrew D. Mccabe
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Docusign Inc
Original Assignee
Docusign Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US16023709P priority Critical
Priority to US61/160,237 priority
Application filed by Docusign Inc filed Critical Docusign Inc
Priority to PCT/US2010/027326 priority patent/WO2010105262A1/en
Publication of CA2755286A1 publication Critical patent/CA2755286A1/en
Application granted granted Critical
Publication of CA2755286C publication Critical patent/CA2755286C/en
Application status is Active legal-status Critical
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/4406Restricting access, e.g. according to user identity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3225Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
    • H04N2201/3246Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of data relating to permitted access or usage, e.g. level of access or usage parameters for digital rights management [DRM] related to still images
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3274Storage or retrieval of prestored additional information

Abstract

The present invention provides systems and methods for dynamically rendering documents during a signing ceremony (instead of validating that signature tasks are placed appropriately on all documents).
The invention establishes a visibility policy that governs how documents are rendered, based on the state of system Tabs (instructions) placed on the documents.

Description

SYSTEMS AND METHODS FOR DOCUMENT MANAGEMENT
TRANSFORMATION AND SECURITY
BACKGROUND OF THE INVENTION

[0002] Today, there is no programmatic way to ensure the contract signing process happens in any particular controllable fashion. Contracts are printed out and physically distributed. Signers sign where they see fit, and may or may not complete the signing correctly. Contract pages may be lost or not returned to the proper person.
Using electronic systems, contracts can be routed using workflow, but these systems are complicated, hard to setup and manage, and usually do not involve the end-user signing process. The existence of a variety of pre-established document formats requires dynamic evaluation and verification of documents for signature. In addition, there is no system to readily restrict access of documents for signature to only those parties that are authorized to review and execute.
SUMMARY OF THE INVENTION
100031 The present invention provides systems and methods for dynamically rendering documents during a signing ceremony (instead of validating that signature tasks are placed appropriately on all documents). The invention establishes a visibility policy that governs how documents are rendered, based on the state of system Tabs (instructions) placed on the documents.
10003a1 Accordingly, there is described a method in a server computer connected to a recipient computer system via a network connection, the method comprising:
establishing a visibility policy that governs access to electronic documents associated with a signing ceremony, by: allowing a first recipient to view an electronic document, if the document includes an instruction for the first recipient to view or sign the electronic document; allowing all recipients to view an electronic document, if the document does not include any viewing or signing instructions; and denying the first recipient access to the electronic document, if the document only includes instructions allowing a second recipient to view or sign the document; receiving at the server computer a request from the first recipient to download a copy of the electronic documents associated with the first recipient; and downloading to the first recipient computer system only electronic documents that were identified as viewable during the signing ceremony.
[000313] There is also described a system comprising: a server computer connected to a recipient computer system via a network connection, the server computer configured to establish a visibility policy that governs access to electronic documents associated with a signing ceremony, by: allowing a recipient to view an electronic document, if the document includes an instruction for that recipient to view or sign the electronic document; allowing all recipients to view an electronic document, if the document does not include any viewing or signing instructions; denying the recipient access to the electronic document, if the document only includes instructions allowing a second recipient to view or sign the document; receiving at the server computer a request from a recipient to download a copy of the electronic documents associated with the recipient; and downloading to the recipient computer system only electronic documents that were identified as viewable during the signing ceremony.
100030 In a further aspect, there is described a computer implemented method of dynamically rendering documents during a signing ceremony, the method comprising:
receiving documents during a signing ceremony having tabs placed on the documents, the tabs comprising instructions to sign the document; and controlling the rendering of the documents to enable a recipient to view a document if the document includes an instruction for the recipient to sign the document, or if the document does not include any instructions for any other recipient to sign the document, and to not enable a recipient to view a document if the document includes instructions for another recipient to sign the document.
BRIEF DESCRIPTION OF THE DRAWINGS
[0004] Preferred and alternative examples of the present invention are described in detail below with reference to the following drawings:
[0005] FIGURE I is a schematic diagram of an example system formed in accordance with the present invention;
[0006] FIGURE 2 is a flow diagram of an example process performed by the system shown in FIGURE 1; and [0007] FIGURE 3 is a combined flow and system diagram.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
[0008] The present invention provides enhanced document management systems and methods for evaluating and transforming portable document format (PDF) documents and security restrictions on electronic document review and execution. FIGURE I
illustrates an example system 20 having an advisor computer system 30, an advisor Customer Relationship Management (CRM) server 32, a user services server 36 and a plurality of user systems 42.
[0009] FIGURE 2 illustrates an example transform process performed by the system 20. FIGURE 3 illustrates a combined system/process diagram.
PDF DOCUMENT TRANSFORMATION
100101 The evaluation and transformation of PDF documents include both input and output transformations. For Static Extensible Markup Language (XML) Forms Architecture (XFA) forms and AcroForms (aka Acrobat Forms), the system 20 correlates the form fields from an input form to fields in a system template. The form field data and - 2a -attributes are then reflected in a system signing ceremony in accordance with the rules defined in a system template (e.g., Editable vs. Read-Only, Required vs.
Optional, Assignment to individual Recipients, placement on the signed document, etc.) One function that this process enables is for the system 20 to render data that was collected from a sender-provided input form to signing parties in an editable format.
Without this transformation process, all form data from input forms is imposed on the documents in a non-editable format during the signing ceremony.
[0011] The following items are currently transferred from the input PDF into the system process:
= Field data = On/Off values for Radio Buttons (Distinct from Display Values) [0012] The following items are currently specified in the template, but may alternatively be included as optional characteristics or extensions of the transform process:
= Field placement = Field rules o Optional vs. Required o Editable vs. Read-only o Edit masks = List items in drop-down fields = Display value vs. Stored value for drop-down fields = Signature fields [0013] The following items are currently transferred from the output PDF into the system process. The system provides the form data that is collected during the signing ceremony in the same (XML) structure that it came in. This allows the systems that consume system data (post-execution) to process the data as if it was extracted from the forms that they provided to the system.

- 3 -DOCUMENT SECURITY RESTRICTIONS
[0014] Business rules currently enforced through validation by the system ensures the following behaviors:
= If any Recipient has a signature/initial task on a document, every Recipient must have a signature/initial task on the document. If there is an Envelope Recipient without a signature/initial task on a document that contains some signature/initial task, system will reject the Envelope upon creation.
= If a document does not have any signature/initial tasks for any Envelope Recipient, the document is perceived to be viewable by all Recipients, and the Envelope is allowed to be created.
[0015] The present invention dynamically renders the documents during a signing ceremony (instead of validating that signature tasks are placed appropriately on all documents). The invention establishes a visibility policy that governs how documents are rendered, based on the state of system Tabs (instructions) placed on the documents contained within the Envelope. Preferably, the system behavior is as follows:
= If a document has a system Tab for a Recipient, the document will be visible for the Recipient.
= If a document has a system Tab for one Recipient but not another, the document will not be visible to the Recipient that lacks the system Tab.
= If the document does not have any system Tabs, the document will be visible to all Recipients.
= If a Recipient chooses to download a copy of their documents through the system web interface, only the documents that were viewable during the signing ceremony will be downloaded.
= Predetermined CertifiedDelivery and CarbonCopy Recipients will see all documents in the Envelope.

- 4 -[0016] The system preferably allows the following additional configuration options:
= Dynamically suppress access to the Certificate of Completion and Envelope History for all Signers, Certified Delivery, and Carbon Copy Recipients.
(These documents/screens display a list of all signers).
= Ability to specify system behavior as an Account-level setting or on an Envelope-basis. In one embodiment, the setting is not available for Account Administrators to manage; i.e., the Account-level setting could be specified for system users who would themselves not have the ability to change the setting.
= Ability to reflect in the Envelope History the system visibility setting.
This information is available for human readability as well as programmatic access.
= Ability to make all documents visible to the Envelope Sender.
= Ability to designate whether Members of the sending Account can see all documents, or whether they are subject to the visibility policy.
[0017] The invention methodology is better understood by reference to the following example. In this scenario, there are two signers, 51 and S2, and four documents subject to the system process, Di, D2, D3 and D4. 51 is asked to sign Dl and D2. S2 is asked to sign Dl and enter data on D4. The resulting behavior in this scenario, according to one embodiment of the present invention, is that 51 will see documents Di, D2 and D3, while S2 will see documents Di, D3 and D4.
[0018] While the preferred embodiment of the invention has been illustrated and described, as noted above, many changes can be made without departing from the spirit and scope of the invention. Accordingly, the scope of the invention is not limited by the disclosure of the preferred embodiment. Instead, the invention should be determined entirely by reference to the claims that follow.

- 5 -

Claims (17)

The embodiments of the invention in which an exclusive property or privilege is claimed are defined as follows:
1. A method in a server computer connected to a recipient computer system via a network connection, the method comprising:
establishing a visibility policy that governs access to electronic documents associated with a signing ceremony, by:
allowing a first recipient to view an electronic document, if the document includes an instruction for the first recipient to view or sign the electronic document;
allowing all recipients to view an electronic document, if the document does not include any viewing or signing instructions; and denying the first recipient access to the electronic document, if the document only includes instructions allowing a second recipient to view or sign the document;
receiving at the server computer a request from the first recipient to download a copy of the electronic documents associated with the first recipient; and downloading to the first recipient computer system only electronic documents that were identified as viewable during the signing ceremony.
2. The method of claim 1, further comprising rejecting creation of an envelope for an electronic document that contains a signature/initial task for the first recipient, if the envelope includes the second recipient without a signature/initial task on the document.
3. The method of claim 1, further comprising allowing creation of an envelope for an electronic document, if the document does not contain any signature/initial tasks for any recipients.
4. The method of claim 1, further comprising allowing predetermined certified delivery recipients and/or carbon copy recipients to view all electronic documents in an envelope.
5. The method of claim 1, further comprising dynamically suppressing access to a certificate of completion and/or envelope history for one or more of: document signers, certified delivery recipients, and carbon copy recipients.
6. The method of claim 1, further comprising allowing a sender of an envelope to view all documents in the envelope.
7. The method of claim 1, further comprising designating whether all members of a sending account can view all of the electronic documents associated with the signing ceremony or whether the members of the sending account are subject to the visibility policy.
8. The method of claim 1, wherein establishing the visibility policy is based on tabs placed on the electronic documents associated with the signing ceremony.
9. The method of claim 8, wherein the electronic documents associated with the signing ceremony are represented in portable document format.
10. The method of claim 1, wherein downloading to the recipient computer system only electronic documents that were identified as viewable during the signing ceremony includes downloading the electronic documents via a web interface.
11. A system comprising:
a server computer connected to a recipient computer system via a network connection, the server computer configured to establish a visibility policy that governs access to electronic documents associated with a signing ceremony, by:
allowing a recipient to view an electronic document, if the document includes an instruction for that recipient to view or sign the electronic document;
allowing all recipients to view an electronic document, if the document does not include any viewing or signing instructions;
denying the recipient access to the electronic document, if the document only includes instructions allowing a second recipient to view or sign the document;
receiving at the server computer a request from a recipient to download a copy of the electronic documents associated with the recipient; and downloading to the recipient computer system only electronic documents that were identified as viewable during the signing ceremony.
12. The system of claim 11, wherein the server computer is further configured to:
reject creation of an envelope for an electronic document that contains a signature/initial task for a first recipient, if the envelope includes a second recipient without a signature/initial task on the document; and allow creation of an envelope for an electronic document, if the document does not contain any signature/initial tasks for any recipients.
13. The system of claim 11, wherein the server computer is further configured to based on the visibility policy, suppress access to a certificate of completion and/or envelope history for one or more of: document signers, certified delivery recipients, and carbon copy recipients.
14. The system of claim 11, wherein the server computer includes a web interface for downloading the electronic documents associated with a signing ceremony, wherein the electronic documents associated with the signing ceremony are represented in portable document format, and wherein the visibility policy is based on tabs placed on the electronic documents associated with the signing ceremony.
15. A computer implemented method of dynamically rendering documents during a signing ceremony, the method comprising:
receiving documents during a signing ceremony having tabs placed on the documents, the tabs comprising instructions to sign the document; and controlling the rendering of the documents to enable a recipient to view a document if the document includes an instruction for the recipient to sign the document, or if the document does not include any instructions for any other recipient to sign the document, and to not enable a recipient to view a document if the document includes instructions for another recipient to sign the document.
16. The computer implemented method according to claim 15, wherein the tabs comprise instructions to sign the document and enter data on the document.
17. The computer implemented method according to claim 15 or 16, including requesting the download of a copy of documents rendered during a signing ceremony, and only receiving documents that were rendered for the recipient during the signing ceremony.
CA2755286A 2009-03-13 2010-03-15 Systems and methods for document management transformation and security Active CA2755286C (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US16023709P true 2009-03-13 2009-03-13
US61/160,237 2009-03-13
PCT/US2010/027326 WO2010105262A1 (en) 2009-03-13 2010-03-15 Systems and methods for document management transformation and security

Publications (2)

Publication Number Publication Date
CA2755286A1 CA2755286A1 (en) 2010-09-16
CA2755286C true CA2755286C (en) 2017-08-29

Family

ID=42728846

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2755286A Active CA2755286C (en) 2009-03-13 2010-03-15 Systems and methods for document management transformation and security

Country Status (8)

Country Link
US (1) US8239496B2 (en)
EP (1) EP2406715A4 (en)
JP (1) JP5889638B2 (en)
CN (1) CN102422269B (en)
AU (1) AU2010223873B2 (en)
CA (1) CA2755286C (en)
SG (2) SG10201400603VA (en)
WO (1) WO2010105262A1 (en)

Families Citing this family (99)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8528086B1 (en) 2004-04-01 2013-09-03 Fireeye, Inc. System and method of detecting computer worms
US9106694B2 (en) 2004-04-01 2015-08-11 Fireeye, Inc. Electronic message analysis for malware detection
US8881282B1 (en) 2004-04-01 2014-11-04 Fireeye, Inc. Systems and methods for malware attack detection and identification
US8584239B2 (en) 2004-04-01 2013-11-12 Fireeye, Inc. Virtual machine with dynamic data flow analysis
US8539582B1 (en) 2004-04-01 2013-09-17 Fireeye, Inc. Malware containment and security analysis on connection
US8566946B1 (en) 2006-04-20 2013-10-22 Fireeye, Inc. Malware containment on connection
US8898788B1 (en) 2004-04-01 2014-11-25 Fireeye, Inc. Systems and methods for malware attack prevention
US8171553B2 (en) 2004-04-01 2012-05-01 Fireeye, Inc. Heuristic based capture with replay to virtual machine
US8375444B2 (en) 2006-04-20 2013-02-12 Fireeye, Inc. Dynamic signature creation and enforcement
US8793787B2 (en) 2004-04-01 2014-07-29 Fireeye, Inc. Detecting malicious network content using virtual environment components
US8549638B2 (en) 2004-06-14 2013-10-01 Fireeye, Inc. System and method of containing computer worms
US9514117B2 (en) 2007-02-28 2016-12-06 Docusign, Inc. System and method for document tagging templates
US8949706B2 (en) 2007-07-18 2015-02-03 Docusign, Inc. Systems and methods for distributed electronic signature documents
US8655961B2 (en) 2007-07-18 2014-02-18 Docusign, Inc. Systems and methods for distributed electronic signature documents
US7930447B2 (en) 2008-10-17 2011-04-19 International Business Machines Corporation Listing windows of active applications of computing devices sharing a keyboard based upon requests for attention
US8850571B2 (en) 2008-11-03 2014-09-30 Fireeye, Inc. Systems and methods for detecting malicious network content
US8997219B2 (en) 2008-11-03 2015-03-31 Fireeye, Inc. Systems and methods for detecting malicious PDF network content
US8484723B2 (en) 2009-06-05 2013-07-09 Signix, Inc. Method and system for signing and authenticating electronic documents via a signature authority which may act in concert with software controlled by the signer
US8832829B2 (en) 2009-09-30 2014-09-09 Fireeye, Inc. Network-based binary file extraction and analysis for malware detection
US9251131B2 (en) 2010-05-04 2016-02-02 Docusign, Inc. Systems and methods for distributed electronic signature documents including version control
US8949708B2 (en) 2010-06-11 2015-02-03 Docusign, Inc. Web-based electronically signed documents
US9064238B2 (en) * 2011-03-04 2015-06-23 Factify Method and apparatus for certification of facts
CA2841812C (en) 2011-07-14 2019-09-24 Docusign, Inc. Online signature identity and verification in community
US9824198B2 (en) 2011-07-14 2017-11-21 Docusign, Inc. System and method for identity and reputation score based on transaction history
US9268758B2 (en) 2011-07-14 2016-02-23 Docusign, Inc. Method for associating third party content with online document signing
CN104025078B (en) * 2011-08-25 2017-03-08 多塞股份公司 Method and apparatus for promoting to sign electronically in the client computing device being associated with subscriber
WO2013058846A1 (en) 2011-10-18 2013-04-25 Dotloop, Llc Systems, methods and apparatus for form building
US9519782B2 (en) 2012-02-24 2016-12-13 Fireeye, Inc. Detecting malicious network content
US9230130B2 (en) 2012-03-22 2016-01-05 Docusign, Inc. System and method for rules-based control of custody of electronic signature transactions
US9367681B1 (en) 2013-02-23 2016-06-14 Fireeye, Inc. Framework for efficient security coverage of mobile software applications using symbolic execution to reach regions of interest within an application
US9009823B1 (en) 2013-02-23 2015-04-14 Fireeye, Inc. Framework for efficient security coverage of mobile software applications installed on mobile devices
US9195829B1 (en) 2013-02-23 2015-11-24 Fireeye, Inc. User interface with real-time visual playback along with synchronous textual analysis log display and event/time index for anomalous behavior detection in applications
US9159035B1 (en) 2013-02-23 2015-10-13 Fireeye, Inc. Framework for computer application analysis of sensitive information tracking
US9176843B1 (en) 2013-02-23 2015-11-03 Fireeye, Inc. Framework for efficient security coverage of mobile software applications
US8990944B1 (en) 2013-02-23 2015-03-24 Fireeye, Inc. Systems and methods for automatically detecting backdoors
US9824209B1 (en) 2013-02-23 2017-11-21 Fireeye, Inc. Framework for efficient security coverage of mobile software applications that is usable to harden in the field code
US9009822B1 (en) 2013-02-23 2015-04-14 Fireeye, Inc. Framework for multi-phase analysis of mobile applications
CA2903807C (en) 2013-03-04 2019-09-03 Docusign, Inc. Systems and methods for cloud data security
US9565202B1 (en) 2013-03-13 2017-02-07 Fireeye, Inc. System and method for detecting exfiltration content
US9626509B1 (en) 2013-03-13 2017-04-18 Fireeye, Inc. Malicious content analysis with multi-version application support within single operating environment
US9355247B1 (en) 2013-03-13 2016-05-31 Fireeye, Inc. File extraction from memory dump for malicious content analysis
US9104867B1 (en) 2013-03-13 2015-08-11 Fireeye, Inc. Malicious content analysis using simulated user interaction without user involvement
US9430646B1 (en) 2013-03-14 2016-08-30 Fireeye, Inc. Distributed systems and methods for automatically detecting unknown bots and botnets
US9311479B1 (en) 2013-03-14 2016-04-12 Fireeye, Inc. Correlation and consolidation of analytic data for holistic view of a malware attack
US9251343B1 (en) 2013-03-15 2016-02-02 Fireeye, Inc. Detecting bootkits resident on compromised computers
US9575622B1 (en) 2013-04-02 2017-02-21 Dotloop, Llc Systems and methods for electronic signature
US9495180B2 (en) 2013-05-10 2016-11-15 Fireeye, Inc. Optimized resource allocation for virtual machines within a malware content detection system
US9635039B1 (en) 2013-05-13 2017-04-25 Fireeye, Inc. Classifying sets of malicious indicators for detecting command and control communications associated with malware
US10133863B2 (en) 2013-06-24 2018-11-20 Fireeye, Inc. Zero-day discovery system
US9536091B2 (en) 2013-06-24 2017-01-03 Fireeye, Inc. System and method for detecting time-bomb malware
US9300686B2 (en) 2013-06-28 2016-03-29 Fireeye, Inc. System and method for detecting malicious links in electronic messages
US9888016B1 (en) 2013-06-28 2018-02-06 Fireeye, Inc. System and method for detecting phishing using password prediction
US9223528B2 (en) * 2013-07-30 2015-12-29 Konica Minolta Laboratory U.S.A., Inc. Electronic content management workflow
EP3039610A1 (en) * 2013-08-27 2016-07-06 Agfa Healthcare System and method for processing documents
US9628507B2 (en) 2013-09-30 2017-04-18 Fireeye, Inc. Advanced persistent threat (APT) detection center
US9294501B2 (en) 2013-09-30 2016-03-22 Fireeye, Inc. Fuzzy hash of behavioral results
US9736179B2 (en) 2013-09-30 2017-08-15 Fireeye, Inc. System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection
US10192052B1 (en) 2013-09-30 2019-01-29 Fireeye, Inc. System, apparatus and method for classifying a file as malicious using static scanning
US9171160B2 (en) 2013-09-30 2015-10-27 Fireeye, Inc. Dynamically adaptive framework and method for classifying malware using intelligent static, emulation, and dynamic analyses
US10089461B1 (en) 2013-09-30 2018-10-02 Fireeye, Inc. Page replacement code injection
US9189627B1 (en) 2013-11-21 2015-11-17 Fireeye, Inc. System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection
US9747446B1 (en) 2013-12-26 2017-08-29 Fireeye, Inc. System and method for run-time object classification
US9756074B2 (en) 2013-12-26 2017-09-05 Fireeye, Inc. System and method for IPS and VM-based detection of suspicious objects
US9286403B2 (en) 2014-02-04 2016-03-15 Shoobx, Inc. Computer-guided corporate governance with document generation and execution
US9241010B1 (en) 2014-03-20 2016-01-19 Fireeye, Inc. System and method for network behavior detection
US10242185B1 (en) 2014-03-21 2019-03-26 Fireeye, Inc. Dynamic guest image creation and rollback
US9591015B1 (en) 2014-03-28 2017-03-07 Fireeye, Inc. System and method for offloading packet processing and static analysis operations
US9223972B1 (en) 2014-03-31 2015-12-29 Fireeye, Inc. Dynamically remote tuning of a malware content detection system
US9432389B1 (en) 2014-03-31 2016-08-30 Fireeye, Inc. System, apparatus and method for detecting a malicious attack based on static analysis of a multi-flow object
US9594912B1 (en) 2014-06-06 2017-03-14 Fireeye, Inc. Return-oriented programming detection
US10084813B2 (en) 2014-06-24 2018-09-25 Fireeye, Inc. Intrusion prevention and remedy system
US9398028B1 (en) 2014-06-26 2016-07-19 Fireeye, Inc. System, device and method for detecting a malicious attack based on communcations between remotely hosted virtual machines and malicious web servers
US9773112B1 (en) 2014-09-29 2017-09-26 Fireeye, Inc. Exploit detection of malware and malware families
US9690933B1 (en) 2014-12-22 2017-06-27 Fireeye, Inc. Framework for classifying an object as malicious with machine learning for deploying updated predictive models
US10075455B2 (en) 2014-12-26 2018-09-11 Fireeye, Inc. Zero-day rotating guest image profile
US9838417B1 (en) 2014-12-30 2017-12-05 Fireeye, Inc. Intelligent context aware user interaction for malware detection
US9690606B1 (en) 2015-03-25 2017-06-27 Fireeye, Inc. Selective system call monitoring
US10148693B2 (en) 2015-03-25 2018-12-04 Fireeye, Inc. Exploit detection system
US9438613B1 (en) 2015-03-30 2016-09-06 Fireeye, Inc. Dynamic content activation for automated analysis of embedded objects
US10474813B1 (en) 2015-03-31 2019-11-12 Fireeye, Inc. Code injection technique for remediation at an endpoint of a network
US10417031B2 (en) 2015-03-31 2019-09-17 Fireeye, Inc. Selective virtualization for security threat detection
US9483644B1 (en) 2015-03-31 2016-11-01 Fireeye, Inc. Methods for detecting file altering malware in VM based analysis
US9594904B1 (en) 2015-04-23 2017-03-14 Fireeye, Inc. Detecting malware based on reflection
US10454950B1 (en) 2015-06-30 2019-10-22 Fireeye, Inc. Centralized aggregation technique for detecting lateral movement of stealthy cyber-attacks
US10176321B2 (en) 2015-09-22 2019-01-08 Fireeye, Inc. Leveraging behavior-based rules for malware family classification
US10033747B1 (en) 2015-09-29 2018-07-24 Fireeye, Inc. System and method for detecting interpreter-based exploit attacks
US9825989B1 (en) 2015-09-30 2017-11-21 Fireeye, Inc. Cyber attack early warning system
US9825976B1 (en) 2015-09-30 2017-11-21 Fireeye, Inc. Detection and classification of exploit kits
US10210329B1 (en) 2015-09-30 2019-02-19 Fireeye, Inc. Method to detect application execution hijacking using memory protection
US10284575B2 (en) 2015-11-10 2019-05-07 Fireeye, Inc. Launcher for setting analysis environment variations for malware detection
US10447728B1 (en) 2015-12-10 2019-10-15 Fireeye, Inc. Technique for protecting guest processes using a layered virtualization architecture
US10133866B1 (en) 2015-12-30 2018-11-20 Fireeye, Inc. System and method for triggering analysis of an object for malware in response to modification of that object
US10341365B1 (en) 2015-12-30 2019-07-02 Fireeye, Inc. Methods and system for hiding transition events for malware detection
US10050998B1 (en) 2015-12-30 2018-08-14 Fireeye, Inc. Malicious message analysis system
US9824216B1 (en) 2015-12-31 2017-11-21 Fireeye, Inc. Susceptible environment detection system
US10476906B1 (en) 2016-03-25 2019-11-12 Fireeye, Inc. System and method for managing formation and modification of a cluster within a malware detection system
US10169585B1 (en) 2016-06-22 2019-01-01 Fireeye, Inc. System and methods for advanced malware detection through placement of transition events
US10462173B1 (en) 2016-06-30 2019-10-29 Fireeye, Inc. Malware detection verification and enhancement by coordinating endpoint and malware detection systems
US10491627B1 (en) 2016-09-29 2019-11-26 Fireeye, Inc. Advanced malware detection using similarity analysis

Family Cites Families (77)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5220675A (en) * 1990-01-08 1993-06-15 Microsoft Corporation Method and system for customizing a user interface in an integrated environment
CA2093094C (en) * 1992-04-06 2000-07-11 Addison M. Fischer Method and apparatus for creating, supporting, and using travelling programs
US5222138A (en) * 1992-08-06 1993-06-22 Balabon Sam D Remote signature rendering system & apparatus
US5465299A (en) * 1992-12-03 1995-11-07 Hitachi, Ltd. Electronic document processing system and method of forming digital signature
JP2762909B2 (en) * 1993-12-27 1998-06-11 日本電気株式会社 Electronic signature device
US5544255A (en) * 1994-08-31 1996-08-06 Peripheral Vision Limited Method and system for the capture, storage, transport and authentication of handwritten signatures
US5748738A (en) * 1995-01-17 1998-05-05 Document Authentication Systems, Inc. System and method for electronic transmission, storage and retrieval of authenticated documents
US7162635B2 (en) * 1995-01-17 2007-01-09 Eoriginal, Inc. System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents
US5615268A (en) * 1995-01-17 1997-03-25 Document Authentication Systems, Inc. System and method for electronic transmission storage and retrieval of authenticated documents
US6367013B1 (en) * 1995-01-17 2002-04-02 Eoriginal Inc. System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents
EP1643340B1 (en) * 1995-02-13 2013-08-14 Intertrust Technologies Corp. Secure transaction management
US5553145A (en) * 1995-03-21 1996-09-03 Micali; Silvia Simultaneous electronic transactions with visible trusted parties
US5813009A (en) * 1995-07-28 1998-09-22 Univirtual Corp. Computer based records management system method
US6327656B2 (en) * 1996-07-03 2001-12-04 Timestamp.Com, Inc. Apparatus and method for electronic document certification and verification
US5898156A (en) * 1996-08-29 1999-04-27 Lucent Technologies Inc. Validation stamps for electronic signatures
US6470448B1 (en) * 1996-10-30 2002-10-22 Fujitsu Limited Apparatus and method for proving transaction between users in network environment
US6021202A (en) * 1996-12-20 2000-02-01 Financial Services Technology Consortium Method and system for processing electronic documents
US5872848A (en) * 1997-02-18 1999-02-16 Arcanvs Method and apparatus for witnessed authentication of electronic documents
US6119229A (en) * 1997-04-11 2000-09-12 The Brodia Group Virtual property system
US6128740A (en) * 1997-12-08 2000-10-03 Entrust Technologies Limited Computer security system and method with on demand publishing of certificate revocation lists
US6199052B1 (en) * 1998-03-06 2001-03-06 Deloitte & Touche Usa Llp Secure electronic transactions using a trusted intermediary with archive and verification request services
CA2242130A1 (en) * 1998-08-07 2000-02-07 Silanis Technology Inc. Method for parallel approval of documents in a distributed network
US6210276B1 (en) * 1998-08-25 2001-04-03 Wayne L. Mullins Game with multiple incentives and multiple levels of game play and combined lottery game with time of purchase win progressive jackpot
CA2246049A1 (en) * 1998-09-25 2000-03-25 Silanis Technology Inc. Method of creating authenticated verifiable reproductions of electronic documents
US6321333B1 (en) * 1998-10-14 2001-11-20 Wave Systems Corporation Efficient digital certificate processing in a data processing system
US6584466B1 (en) * 1999-04-07 2003-06-24 Critical Path, Inc. Internet document management system and methods
US6615348B1 (en) * 1999-04-16 2003-09-02 Intel Corporation Method and apparatus for an adapted digital signature
CA2272723A1 (en) * 1999-05-25 2000-11-25 Rdm Corporation Digital signature server
EP1055989A1 (en) * 1999-05-28 2000-11-29 Hewlett-Packard Company System for digitally signing a document
US6785815B1 (en) * 1999-06-08 2004-08-31 Intertrust Technologies Corp. Methods and systems for encoding and protecting data using digital signature and watermarking techniques
US6671805B1 (en) * 1999-06-17 2003-12-30 Ilumin Corporation System and method for document-driven processing of digitally-signed electronic documents
US6367010B1 (en) * 1999-07-02 2002-04-02 Postx Corporation Method for generating secure symmetric encryption and decryption
US6289460B1 (en) * 1999-09-13 2001-09-11 Astus Corporation Document management system
US6931420B1 (en) * 1999-09-24 2005-08-16 Silanis Technology Inc. Method for the separate authentication of a template and user data
US20030078880A1 (en) * 1999-10-08 2003-04-24 Nancy Alley Method and system for electronically signing and processing digital documents
JP4011243B2 (en) * 1999-10-15 2007-11-21 富士通株式会社 Electronic original management apparatus and method
US7237114B1 (en) * 2000-04-26 2007-06-26 Pronvest, Inc. Method and system for signing and authenticating electronic documents
WO2001095560A1 (en) * 2000-06-06 2001-12-13 Ingeo Systems, Inc. Secure electronic document network transport process
US7069443B2 (en) * 2000-06-06 2006-06-27 Ingeo Systems, Inc. Creating and verifying electronic documents
AU6673601A (en) * 2000-06-06 2001-12-17 Ingeo Systems Inc Processing electronic documents with embedded digital signatures
JP4134494B2 (en) * 2000-06-15 2008-08-20 株式会社日立製作所 Contract method and contract processing system
AU7362401A (en) * 2000-06-21 2002-01-02 Docutouch Corp Digital signature system and method
WO2002017539A2 (en) * 2000-08-18 2002-02-28 Distributed Trust Management Inc. Distributed information system and protocol for affixing electronic signatures and authenticating documents
US6944648B2 (en) * 2000-09-22 2005-09-13 Docusign, Inc. System and method for managing transferable records
JP2002139997A (en) * 2000-11-02 2002-05-17 Dainippon Printing Co Ltd Electronic sealing system
US7100045B2 (en) * 2000-11-22 2006-08-29 Kabushiki Kaisha Toshiba System, method, and program for ensuring originality
US7360079B2 (en) * 2001-01-05 2008-04-15 Yozons, Inc. System and method for processing digital documents utilizing secure communications over a network
SG111920A1 (en) * 2001-09-03 2005-06-29 Trusted Hub Pte Ltd Authentication of electronic documents
US7395436B1 (en) * 2002-01-31 2008-07-01 Kerry Nemovicher Methods, software programs, and systems for electronic information security
JP2003271529A (en) * 2002-03-18 2003-09-26 Honda Motor Co Ltd Proposal document circulation system, proposal document circulation method, management server, proponent terminal, browser terminal and recording medium
US7562053B2 (en) * 2002-04-02 2009-07-14 Soluble Technologies, Llc System and method for facilitating transactions between two or more parties
CA2849152C (en) * 2002-06-17 2015-08-25 Robert Al-Jaar System and method for creating, vaulting, transferring, and controlling transferable electronic records with unique ownership
EP1593063A4 (en) * 2002-11-04 2006-10-04 Timothy K Ford Method and system for comprehensive real estate transaction management
US7581105B2 (en) * 2003-12-16 2009-08-25 Sap Aktiengesellschaft Electronic signing apparatus and methods
US7523315B2 (en) * 2003-12-22 2009-04-21 Ingeo Systems, Llc Method and process for creating an electronically signed document
US8572388B2 (en) * 2004-03-10 2013-10-29 Elynx, Ltd. Electronic document management system
US7568101B1 (en) * 2004-05-13 2009-07-28 Microsoft Corporation Digital signatures with an embedded view
US7568104B2 (en) * 2005-01-19 2009-07-28 International Business Machines Corporation Method and apparatus for adding signature information to electronic documents
US8221210B2 (en) * 2005-03-08 2012-07-17 Scientific Games International, Inc. Lottery game having secondary game with multiplier and second payout
US20060259440A1 (en) * 2005-05-13 2006-11-16 Keycorp Method and system for electronically signing a document
US7654529B2 (en) * 2005-05-17 2010-02-02 Scientific Games International, Inc. Combination scratch ticket and on-line game ticket
US7554576B2 (en) * 2005-06-20 2009-06-30 Ricoh Company, Ltd. Information capture and recording system for controlling capture devices
US7442122B2 (en) * 2005-07-26 2008-10-28 Advanced Gaming Concepts, Llc Variable lottery game allowing participation in several different lottery games within a single drawing
US7890659B2 (en) * 2005-12-15 2011-02-15 Microsoft Corporation Conforming web services to an updated contract
JP4821307B2 (en) * 2005-12-21 2011-11-24 沖電気工業株式会社 Contract reception terminal and contract system
JP4137951B2 (en) * 2006-03-28 2008-08-20 シャープ株式会社 Image processing apparatus, system, information processing apparatus, and program
JP2008077340A (en) * 2006-09-20 2008-04-03 Oki Electric Ind Co Ltd Contract reception terminal and contract system
JP2008083823A (en) * 2006-09-26 2008-04-10 Oki Electric Ind Co Ltd Contract acceptance terminal and contract system
US20080097777A1 (en) * 2006-10-23 2008-04-24 Ctm Software Corporation Electronic document execution
US9514117B2 (en) * 2007-02-28 2016-12-06 Docusign, Inc. System and method for document tagging templates
JP2008217462A (en) * 2007-03-05 2008-09-18 Oki Electric Ind Co Ltd Contract system
JP2008225527A (en) * 2007-03-08 2008-09-25 Tadayuki Hattori General-purpose and safe home computing platform for preventing authority from being centralized on system manager for achieving communication and workflow for each "home or family"
JP2008234500A (en) * 2007-03-23 2008-10-02 Oki Electric Ind Co Ltd Loan contract receiving terminal and loan contracting system
US8650038B2 (en) * 2007-07-17 2014-02-11 William Howard Peirson, JR. Systems and processes for obtaining and managing electronic signatures for real estate transaction documents
US8949706B2 (en) * 2007-07-18 2015-02-03 Docusign, Inc. Systems and methods for distributed electronic signature documents
US8655961B2 (en) * 2007-07-18 2014-02-18 Docusign, Inc. Systems and methods for distributed electronic signature documents
CN101299256A (en) * 2008-06-18 2008-11-05 深圳市永达电子有限公司 Method and system for recognizing electric contract based on grid computing and data integration

Also Published As

Publication number Publication date
EP2406715A1 (en) 2012-01-18
SG174343A1 (en) 2011-10-28
US20100287260A1 (en) 2010-11-11
SG10201400603VA (en) 2014-05-29
EP2406715A4 (en) 2013-01-16
CN102422269A (en) 2012-04-18
WO2010105262A1 (en) 2010-09-16
AU2010223873A1 (en) 2011-10-13
JP5889638B2 (en) 2016-03-30
CN102422269B (en) 2015-02-25
CA2755286A1 (en) 2010-09-16
AU2010223873B2 (en) 2016-08-11
US8239496B2 (en) 2012-08-07
JP2012520530A (en) 2012-09-06

Similar Documents

Publication Publication Date Title
Mont et al. Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services
Ellison SPKI requirements
US7730094B2 (en) Scoped access control metadata element
EP1299790B1 (en) Filtering a permission set using permission requests associated with a code assembly
KR101159384B1 (en) Method and apparatus for provisioning software
JP4599360B2 (en) Method and system for synchronizing identification information
EP1118925B1 (en) Security policy applied to common data security architecture
US9547770B2 (en) System and method for managing collaboration in a networked secure exchange environment
KR100968303B1 (en) A generic declarative authorization scheme for java
US9602547B1 (en) User-portable device and method of use in a user-centric identity management system
CN103917999B (en) On-line signature identity and verification method and its system in community
US20030028774A1 (en) Ensuring the integrity of an electronic document
US10348774B2 (en) Method and system for managing security policies
Hafner et al. Security engineering for service-oriented architectures
US20060143040A1 (en) icFoundation web site development software and icFoundation Biztalk server 2000 integration
KR100896391B1 (en) External device
US20110270748A1 (en) Methods and apparatus for a financial document clearinghouse and secure delivery network
US20050210263A1 (en) Electronic form routing and data capture system and method
CN103988198B (en) Application market manages control
TWI432000B (en) Provisioning of digital identity representations
US20060277595A1 (en) Techniques for providing role-based security with instance-level granularity
US7434252B2 (en) Role-based authorization of network services using diversified security tokens
CN101911585B (en) Selective authorization based on authentication input attributes
JP4864898B2 (en) Method and apparatus for dynamically activating / deactivating an operating system
US20070079385A1 (en) Managing user permissions in a computer system

Legal Events

Date Code Title Description
EEER Examination request

Effective date: 20150216